US10614225B2 - System and method for tracing data access and detecting abnormality in the same - Google Patents
System and method for tracing data access and detecting abnormality in the same Download PDFInfo
- Publication number
- US10614225B2 US10614225B2 US16/056,050 US201816056050A US10614225B2 US 10614225 B2 US10614225 B2 US 10614225B2 US 201816056050 A US201816056050 A US 201816056050A US 10614225 B2 US10614225 B2 US 10614225B2
- Authority
- US
- United States
- Prior art keywords
- asset
- dna
- data
- deviation
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Definitions
- the present invention generally relates to data security, and more specifically, relates to a system and method that detect abnormality in data access.
- Information is becoming most valuable asset for any company in today's business world and consequently the need to protect the information is of paramount importance for every company.
- the information owners need to know who are accessing and using the information and how the information is accessed. Only by knowing how the information is accessed, it is possible to detect abnormalities in a system through which the information is accessed.
- the amount of data that needs to be collected and analyzed overwhelms any system designed to track and protect the data in an information system, especially when the data collected seem unrelated to each other.
- the system of the present invention provides an easy way to trace data access and to detect abnormality related to data access.
- the present invention provides a method for responding to a system attack, by an apparatus comprising a monitoring unit, a non-volatile computer-readable memory, and a control unit and the method comprises receiving, by the monitoring unit, a system access request, creates an event DNA for the system access request and an asset DNA for each resource associated with the system access request; records one or more deviation between one or more created asset DNAs and corresponding stored asset DNAs, quantifies risks associated with each deviation according to a user policy; and identifies a response according to the quantified risks.
- an apparatus for identifying risks associated with information access requests in a system.
- the apparatus comprises a network interface unit in communication with a network, a monitoring unit network in communication with the network interface and receiving information access request from the network, a control unit, and a non-volatile computer-readable memory in communication with the monitoring unit, wherein the control unit receives a system access request, creates an event DNA for the system access request and an asset DNA for each resource associated with the system access request, records one or more deviation between one or more created asset DNAs and corresponding stored asset DNAs, quantifies risks associated with each deviation according to a user policy, and identifies a response according to the quantified risks.
- a non-transitory computer readable medium on which is stored a computer program for identifying risks associated with information access requests in a system.
- the computer program comprises computer instructions that when executed by a computing device with a monitoring unit, a non-volatile computer-readable memory, and a control unit causes the computing device to perform the steps for receiving, by the monitoring unit, a system access request, creating an event DNA for the system access request and an asset DNA for each resource associated with the system access request, recording one or more deviation between one or more created asset DNAs and corresponding stored asset DNAs, quantifying risks associated with each deviation according to a user policy, and identifying a response according to the quantified risks.
- FIG. 1 depicts a data access scenario 100 of multiple users accessing multiple data
- FIG. 2 depicts a flowchart 200 of a process executed by a system for handling a new asset
- FIG. 3 depicts a data DNA model
- FIG. 4 illustrates an asset DNA when the asset is a user
- FIG. 5 illustrates an asset DNA when the asset is access rules
- FIG. 6 Illustrates an asset DNA when the asset is events
- FIG. 7 illustrates data associated with an event DNA
- FIG. 8 illustrates an example of a group event DNA
- FIG. 9 depicts a flowchart of a process for monitoring activities in a system
- FIG. 10 illustrates an apparatus according to one embodiment of the present invention.
- FIG. 11 illustrates a flowchart 1100 for identifying an attack.
- the term “application” as used herein is intended to encompass executable and non-executable software files, raw data, aggregated data, patches, and other code segments.
- the term “exemplary” is meant only as an example, and does not indicate any preference for the embodiment or elements described. Further, like numerals refer to like elements throughout the several views, and the articles “a” and “the” includes plural references, unless otherwise specified in the description.
- the terms “system” and “network” are used interchangeably and the terms “data” and “information” are also used interchangeably unless otherwise stated.
- FIG. 1 is a simple illustration 100 of different elements involved in data access operations in a system.
- Multiple users U n may access information stored in one or more servers S n .
- a user U 1 may request data stored on a server S 1 through an action A 1 that follows a rule (policy) R 1 ; the user U 1 may also use the same command (action) A 1 , following the same rule R 1 , to access another data stored on another server S 2 .
- user U 2 may request a piece of information stored on the server S 2 through a command A 2 that follows a rule R 2 .
- the same information request from the user U 2 can also be made by invoking the command A 1 using the rule R 2 .
- the above description reflects a common scenario in today's business world, where an employee Adam can access a design data X stored on a server S 1 while working on his computer in his office and also can continue to work, using the same design data X, from his home computer.
- the design data X may also be accessed by another employee Bob who uses his laptop computer to access the design data X while on a business trip.
- one piece of information may be accessed by different users at different times by different methods and one user may also access use different methods to access different data from different locations.
- a tracking and monitoring system needs to track each action and store information associated with each action. This tracking and monitoring operation creates a huge amount of data that are related to each other.
- the present invention introduces a concept of data DNA.
- the data DNA is a set of data representing a data model based on the concept of molecule formed by atoms and bonds and this data mode enables users to easily describe data access, data transactions, and data activities.
- the data DNA model also enables users to discover and manage data elements (atoms) and interactions (bonds) between them during a data access.
- the methods based on this data DNA model enable auditing, regulating data access and access behaviors. These access behaviors can be changed by rules and actions from the users.
- business needs for data audit, data security, data forensics, data asset management, and data analytics can be easily accomplished.
- the data DNA model is useful to describe data, data assets, data activities, data policies, data transactions, data events, data risks, and data life cycle. Under this data DNA model, several related models can be derived, such as asset DNA, event DNA, rule DNA, etc.
- asset DNA may be used to describe data asset, data asset group, or data asset type, in terms of atoms and bonds.
- event DNA may be used to describe data activity or collection of data activities also in terms of atoms and bonds.
- atom is a basic building block and may refer to assets, rules, and actions.
- Assets may include servers, clients, users, databases, tables, columns, data signatures, conditions, errors, etc.
- Rules are generally defined and/or configured by users.
- Actions are also defined and/or configured by users.
- Another basic building block is bond and bond refers to the relationships between atoms, such as the relationship between a database (DB) user and a server, a database, a client program, a data signature, rules, actions, . . . Bond may be used to detect “vibrations” in the data model and this reflects to deviations in data behavior.
- DB database
- assets are the building blocks to form an access and the asset may include:
- FIG. 2 is a flowchart 200 of a process executed by a system for handling a new asset.
- the system identifies the type of the event, step 204 , i.e., whether the event relates to a new user, an access command, an object, etc.
- the system also determines whether the event refers to any new asset, step 206 . If the event refers to a new asset, for example, a new user, then a new set of data is created to represent this new user asset and a time of creation (modified time) is recorded, step 208 .
- the asset may also not to be new. For example, the user may be an existing user.
- the system checks whether there is new association associated with the asset created, step 210 .
- An association is a relationship with other assets. If there are new associations, step 212 , for example, a user accessing records in a database never accessed before, the new associations will be created and the creation time is recorded, step 214 .
- the asset associations may also be existing, not new. For example, a known user accessing a record that he has accessed before in a manner that he has done before; the asset and the asset associations would not be new.
- the asset DNA for this asset is updated, step 216 , and the access time is also updated 218 .
- Atom 302 represents a central asset for the asset DNA 300 .
- the relationships are the links 304 between atom 302 and other atoms 306 .
- the asset DNA 300 refers to a central asset 302 and its relationship with other assets 306 .
- the asset DNA to forms a baseline for each individual asset and any combination of assets, also known as an asset group.
- An asset group is a group of assets of the same asset type.
- rules and actions in a system can also be treated like assets and this flexibility enhances the security surveillance in the system.
- rules and action are also treated like assets. For example, access rules, content rules, signatures, behavior rules, and actions are all considered as asset DNA.
- the asset DNA enables security surveillance to view data from different views and from perspective of different assets or combination of assets as shown in the following description for FIGS. 4-6 .
- An application of the data DNA model for user James is an asset DNA 400 illustrated in FIG. 4 .
- the asset DNA 400 is also known as a user DNA for user James and the central asset 402 is the database user James.
- the user James can perform many functions within the system and thus maintains relationship with many other assets. For example, user James can access a record in a database located in a database server.
- the command used by James is an asset 404 ; the database is another asset 406 and the database server is yet another asset 408 .
- the action of James to access a record is an event, which is also an asset 410 .
- each asset it is also depicted in FIG. 4 different instances of each asset.
- asset 408 type database server
- three instances 412 , 414 , and 416 are show.
- Each instance represents a database server that user James 402 has accessed previously.
- Each command previously invoked by user James 402 is also shown as an instance of the command asset 404 and each rule that applies to every access by user James 402 is also listed as instance of asset 418 for rules.
- Asset DNA 500 shows access rule 502 as the central asset.
- the access rule 502 may affect how database 504 and database server 506 are accessed, so there are relationship between the access rule 502 and the database 504 and the database server 506 . Errors may happen during an access, so asset error 508 is also linked to the access rule 502 and different errors are listed as instances of the asset error 508 .
- FIG. 6 depicts an asset DNA 600 for event asset 602 .
- an event DNA can describe one or a collection of events or data activities. By viewing the system from the data activities aspect for given time durations, it can be easily detect what other assets were involved in these event and what risks are involved.
- an asset DNA similar to those shown in FIGS. 3-6 can be constructed.
- this user when the new event relates to a new database user, rich@10.1.1.119, this user will have an asset DNA similar to one shown in FIG. 4 and the information related to the event detected, for example database accessed and command (sqlcmd) used, will also show up in the asset DNA for this user.
- This asset DNA enables the system to predict what other assets this asset may have a relation (connection) and thus making easier to predict what operations harmless and what operations are suspicious. For example, if the asset DNA for user James shows that James accesses database EMP and Master and the database servers often accessed are AAA, BBB, and CCC. If user Rich is of the same user type as James, then an access by Rich to database EMP is less likely to be harmful even if Rich has never accessed database EMP before.
- An event is formed by data DNA and these data DNA can be for data related to who (user identity), what (object), how (user method), where (user location), and when (time).
- the data DNA can also be for a group of events, assets, rules, and actions.
- baseline events can be derived and these baseline events are useful for detection of new and variation events.
- the variation events are new events and/or events that with new bonds (new relations to other assets) and the variations events can be indications of attacks (malware) or indications of change in user behaviors as described in the above paragraph.
- Critical events such as deviations from the baseline events, can be easily detected after applying proper filters. Changes in user behaviors are like DNA mutation that may be an indication of a problem but may also be an indication of a new normal. DNA mutations are candidates for further investigation by the user.
- new asset or new association may be detected. This analysis may be done for asset DNA, event DNA, and rule DNA.
- the DNA mutation may involve one or more variable deviations.
- One variable mutation enables detection of a new asset or a new association. Multiple variable mutations enable detection of more than one assets or detection of new associations for multiple assets.
- One example of a single variable mutation is an asset DNA for user James working from his home. James may use a home computer to access data in a server in his office. In this scenario, the user is known, the data has been accessed before, the server has been accessed before, and the only new variable is the location from where James is accessing the data.
- An example of multiple variable mutations is when James accesses a new data, never accessed before, from his home computer. In this scenario, two new variables are the location and the data.
- the data DNA modeling can detect not only anomaly or deviation, but also detect anomaly not easily detectable from one single user perspective.
- the data DNA modeling enables an easy detection of a system wide attack even each operation may seem to be harmless. For example, if a large number of users start to access a database, at the same time, that are not listed in the database associated with their asset DNA, this may be an indication that the system is not normal and may be under attack, even if individual access of a database by one user may seem harmless. This is a situation that overloads server resources and causes denial of service. Because of the availability of asset DNA for each asset, it is now possible to predict what is normal and what can be expected even it is not shown in the asset DNA.
- FIG. 7 is an illustration 700 of data associated with an individual event DNA.
- the event DNA data 702 such as time of the event and connection are captured. Other data of the event are captured as well.
- the event DNA as shown in FIG. 7 are repeated for all events detected in the system and the data related to all the events captured and stored. These data can be filtered.
- FIG. 8 illustrates an example 800 of a group event DNA. This group event DNA is the result of filtering of previously stored data.
- FIG. 8 is a summary of activities of a group of events in a group event DNA.
- a group of events is a collection of events, for example of using a set to represent each event:
- event 1 ⁇ a 1 ⁇ , ⁇ b 1 , b 2 ⁇ , ⁇ c 1 , c 2 , c 3 ⁇ , ⁇ d 1 , d 2 ⁇
- event 2 ⁇ a 2 ⁇ , ⁇ b 2 , b 3 ⁇ , ⁇ c 2 , c 3 ⁇ , ⁇ d 1 , d 3 ⁇
- event 3 ⁇ a 3 ⁇ , ⁇ b 1 , b 3 ⁇ , ⁇ c 3 , c 4 ⁇ , ⁇ d 4 ⁇
- a ‘new event’ is an event set did not exist before.
- asset sets Similar to the above event sets, a group of assets (of the same type) may be represented asset sets:
- asset 1 ⁇ x 1 , x 2 ⁇ , ⁇ y 1 , y 2 , y 3 ⁇ , ⁇ z 1 , z 3 ⁇
- asset 2 ⁇ x 2 , x 3 ⁇ , ⁇ y 2 ⁇ , ⁇ z 2 , z 3 ⁇
- asset 3 ⁇ x 3 , x 4 ⁇ , ⁇ y 3 ⁇ , ⁇ z 4 ⁇
- a ‘new asset’ is an asset element (atom) which did not exist before.
- a ‘new asset association’ is a new member to the asset set.
- the data DNA model of the present invention can be applied to data collected from different data accesses, such as data requests from web services, data requests from applications, and data requests to database.
- the data can be structure data, such as database, unstructured data, such as files, semi-structured data, such as big data, cloud data, such Dropbox and Google Documents, etc.
- the data DNA model enables data to be viewed from different perspectives, abnormalities, if not detectable from one perspective, can be detected from a different perspective. For example, an asset DNA of an user accessing a table in a database at an evening hour may seem harmless, however, another asset DNA of the access to the same table at the same time from a high number of users will review a possible system wide attack.
- a system access can be represented by commands and data involved. From the commands involved, different data DNA can be retrieved. For example, if a request from a web application for a data on a database server, an event data representing this system access can be formed. Other data DNA can also be formed, for example, an application DNA representing the access from the web application and an asset DNA representing the database can be both formed. These asset DNAs can be compared with the asset DNA retrieved for each asset.
- a deviation By comparing the asset DNA for each asset involved with the system access with the retrieved DNA for the corresponding asset, a deviation, if any, can be observed.
- the deviations are used to identify any type of attacks (or virus) that may be hidden in the system requests.
- the system access is a request from a web application to retrieve a user data and there is an anomaly from this system access
- the asset DNA for the database and the event DNA for web application can be retrieved.
- the event DNA from the system access is compared with these two data DNAs and their deviations noted. Anomalies are deviations from an established standard. The deviations are used to identify the type of attack that the system may be under.
- the anomaly is identified as W5D3, for example. After knowing and identifying the deviations, the system can then proceed to find a best solution to handle this anomaly.
- the system may have access to a database with a list of known virus or attacks and W5D3 may be listed as one of the known attacks.
- the data DNA modeling also helps to organize the data collected in a system. Normally, the amount of the data collected is huge and it is difficult to capture the data and the relationship between one datum and other data. Because of the data DNA model captures and caches every new data DNA, the relationship between this captured datum and other data is tracked for future references, unless there is a new piece of data that forms a new relationship with this datum.
- each asset may be assigned a risk factor according to its business value and each rule may also be assigned a risk factor according to its significance.
- An event risk may be calculated from asset risks and rule risks.
- FIG. 9 depicts a flowchart 900 of a process for monitoring activities in a system.
- the system checks whether it involves a new user, step 904 . If the new event relates from a known user, the set of data representing the user DNA associated with the user is retrieved, step 906 . If the event is from a new user, a generic user DNA is created, step 908 .
- the generic user DNA includes typical connections to common “atoms,” i. e., the generic user DNA has information on the most commonly actions performed by a similar user and most common objects of these actions. This generic user DNA can provide a general idea about the expected behavior of the new user.
- the generic user DNA is created based on the category of the new user. If the new user is a database administrator, then the generic user DNA will have most common attributes of a database administrator DNA. If the new user is someone working on the human resource department, the generic user DNA created would be different from the generic user DNA for a database administrator.
- the system proceeds to perform actions substantially similar to these user DNAs.
- the system checks whether there is any new asset (atom) involved, step 910 . If the user is accessing a data that he has not accessed before, this data would be a new asset. This situation is also illustrated in FIG. 4 , when user James 402 accesses a new data EMP 420 . After detecting the event involves a new asset (a new data), the system checks whether this new asset is part of the generic user DNA, step 912 . The new asset is part of the generic user DNA if other user similar to James has accessed this asset before.
- step 914 If the new asset is not part of the generic user DNA, then it will be recorded, step 914 , as part of the user DNA for the user.
- the risk level associated with this event is also increased, step 916 , because of the access to a new asset not previously accessed before.
- the system After checking whether the new asset is part of the generic user DNA, the system also check whether the method used to access this asset is new, i.e., if there is a new bond (aka, a new relationship) between user James and this new asset, step 918 . If the method is new, i.e., there is a new bond, then this method is recorded for James' user DNA, step 920 , and the risk level is further increased, step 922 . The step 918 is done by comparing the method used with the methods recorded in James' user DNA. If the event detected in step 902 is from a new user and consequently the generic user DNA is used, the checking of the new bond is done by checking the method against the methods listed in the generic user DNA, which are the most common methods used by users of similar qualifications.
- a new bond aka, a new relationship
- the process described in FIG. 9 is applicable for other assets, such as server, database, etc. and also helps to predict the risk level of a new asset.
- assets such as server, database, etc.
- a generic asset DNA can be used to predict what relationships are likely to be accepted for this new asset and consequently the risk level can be predicted.
- FIG. 10 illustrates an apparatus 1002 according to one embodiment of the present invention.
- the apparatus 1002 connects to a network through a network interface unit 1008 and monitors access requests, through a monitoring unit 1004 , to one or multiple data servers connected to the network.
- the control unit 1010 checks whether the access request involves a known asset or an existing asset, i.e., whether the access request is from a known user or directed toward a known database on a known server, by checking the asset database stored in the storage unit 1020 .
- the storage unit 1020 is a non-volatile computer-readable memory unit and may be internal or external to the apparatus 1002 .
- the storage unit 1020 stores computer programs that, when executed by the control unit 101 , enables the apparatus 1002 to perform functions described in this specification.
- the control unit 101 will identify from the access request all the associations for the asset and these associations are checked against the asset DNA for the asset.
- the apparatus 1002 also includes an audit policy unit 1006 for storing audit policy entered by user through a user interface 1012 .
- the audit policy is used by the apparatus 1002 to audit the access requests collected from the network and also stored in the storage unit 1020 . When abnormalities are detected, alerts will be issued by the control unit 1010 .
- Apparatus 1002 of the present invention can enhance data security through the data DNA modeling.
- the data DNA modeling enables representation of not only individual asset but also group asset.
- the user DNA for this user is retrieved and checked. This access may be done by a known user to a data that he has accessed before, so no alert is noted. The same access can also be view from the database server perspective.
- the database server DNA for the database server can be retrieved and checked. If the database server DNA shows multiple users accessing the same data at the same evening hour, this may be an indication of something abnormal even if, individually, all the accesses are seemingly normal. This is an illustration of a view from a single asset's perspective may not detect any problem but a view from another asset's perspective may indicate a hidden attack.
- FIG. 11 illustrates a flowchart 1100 for identifying an attack.
- a system access for example a user making a data access from a database application
- an event DNA is created and associated with this event, step 1104 .
- Other asset DNAs for each asset involved are also created and these asset DNAs and the event DNA are recorded, step 1106 .
- a database DNA for the human resource database is created and a server DNA for the server where the human resource database is stored is also created.
- Each event DNA and asset DNA is assigned an identification.
- Each newly created asset DNA is compared with previously stored asset DNAs for that asset, step 1108 .
- the user DNA for the user is compared with the stored user DNA for the particular user and the database DNA is compared with the stored database DNA for that particular database. If there is anomaly associated with this database DNA, the deviation between this database DNA and the previously stored database DNA is noted, step 1110 . Deviations from other comparisons are also detected and stored. The deviation from a system access may trigger policy actions if the deviation violates a policy, step 1112 . The deviations are recorded, step 1114 .
- An attack typically takes place in several events and each event may lead to deviation of many asset DNAs of many asset types.
- a risk management system can devised using the present invention.
- the risk management system quantifies aggregated risk from deviation of each asset DNA of each asset type according to user-defined policy rules, step 1116 , and after all deviations are detected and identified, the system can identify the attack that is affecting the system, step 1118 .
- the deviations that forms this aggregated risk serve as a signature of the attack and the identification of the type of the attack. If the attack is known, step 1120 , because all the deviations are known, the system may have access to a counter measure to this attack, step 1122 . If the attack is new and previously unknown, the system alerts the system administrator, step 1124 , who can take proper action.
- rule DNA could also be used to model the relation for a given rule and associated assets and managed by the risk management system.
- a single deviation may not trigger any alert on the system but deviations detected by many different asset DNAs can be an indication of an attack.
- the system can determine the triggering conditions through policies and rules.
- the risk management system based on the present invention can compute risk from:
- each risk is computed by comparing a deviation with a predefined trigger level defined by a risk policy.
- Each individual risk may not exceed a predefined risk level and raise the alarm but the aggregated risk may cause the alarm.
- FIGS. 2, 9, and 11 can be achieved by the control unit executing computer programs stored in the storage unit 1020 . Furthermore, in the context of FIGS. 2, 9, and 11 , the steps illustrated do not require or imply any particular order of actions. The actions may be executed in sequence or in parallel.
- the method may be implemented, for example, by operating portion(s) of a network device, such as a network router or network server, to execute a sequence of machine-readable instructions.
- the instructions can reside in various types of signal-bearing or data storage primary, secondary, or tertiary media.
- the media may comprise, for example, RAM (not shown) accessible by, or residing within, the components of the network device.
- the instructions may be stored on a variety of machine-readable data storage media, such as DASD storage (e.g., a conventional “hard drive” or a RAID array), magnetic tape, electronic read-only memory (e.g., ROM, EPROM, or EEPROM), flash memory cards, an optical storage device (e.g. CD-ROM, WORM, DVD, digital optical tape), paper “punch” cards, or other suitable data storage media including digital and analog transmission media.
- DASD storage e.g., a conventional “hard drive” or a RAID array
- magnetic tape e.g., magnetic tape
- electronic read-only memory e.g., ROM, EPROM, or EEPROM
- flash memory cards e.g., an optical storage device
- an optical storage device e.g. CD-ROM, WORM, DVD, digital optical tape
- paper “punch” cards e.g. CD-ROM, WORM, DVD, digital optical tape
- the instructions when executed by a computer will enable the computer
- the units illustrated in FIG. 10 are described based on their function and these units may have different physical implementation, such as the units may be combined or implemented in one or more computers.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Databases & Information Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Debugging And Monitoring (AREA)
Abstract
Description
-
- Servers, Clients
- App User, DB Users, Programs, OS Accounts, Client Hosts, Language, Charset
- Method—Commands and Command Statement
- Read, write, select, insert, update, exec, etc.
- Objects—Data Containers, DB, Tables, Columns, Conditions
- Contents—signatures, patterns
- Results—outputs and Errors
- Policies—defined by users
- Actions—defined by users
- Groups—defined by users
-
- Rule Risk Level
- Asset Sensitivity Level
- Risk of New Asset DNA according to Asset Type
- Risk of New Asset Association according to Asset Type
- Risk of New Rule DNA
- Risk of New Rule Association
- Risk of New Event DNA
Risk=Sum ($RuleRisk)+Sum ($AssetRisk)+Sum ($NewAssetDNARisk)+Sum($NewAssetAssociation)+Sum($NewRuleDNARisk)+Sum($NewRuleAssociation)+Sum($newEventDNA)
Claims (17)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/056,050 US10614225B2 (en) | 2016-01-07 | 2018-08-06 | System and method for tracing data access and detecting abnormality in the same |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/990,399 US10068094B2 (en) | 2016-01-07 | 2016-01-07 | System and method for tracing data access and detecting abnormality in the same |
US16/056,050 US10614225B2 (en) | 2016-01-07 | 2018-08-06 | System and method for tracing data access and detecting abnormality in the same |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/990,399 Continuation US10068094B2 (en) | 2016-01-07 | 2016-01-07 | System and method for tracing data access and detecting abnormality in the same |
Publications (2)
Publication Number | Publication Date |
---|---|
US20180349616A1 US20180349616A1 (en) | 2018-12-06 |
US10614225B2 true US10614225B2 (en) | 2020-04-07 |
Family
ID=59274914
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/990,399 Active 2036-09-04 US10068094B2 (en) | 2016-01-07 | 2016-01-07 | System and method for tracing data access and detecting abnormality in the same |
US16/056,050 Active US10614225B2 (en) | 2016-01-07 | 2018-08-06 | System and method for tracing data access and detecting abnormality in the same |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/990,399 Active 2036-09-04 US10068094B2 (en) | 2016-01-07 | 2016-01-07 | System and method for tracing data access and detecting abnormality in the same |
Country Status (1)
Country | Link |
---|---|
US (2) | US10068094B2 (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10419460B2 (en) * | 2017-07-21 | 2019-09-17 | Oath, Inc. | Method and system for detecting abnormal online user activity |
US10803192B2 (en) * | 2018-04-08 | 2020-10-13 | Imperva, Inc. | Detecting attacks on databases based on transaction characteristics determined from analyzing database logs |
US12093414B1 (en) * | 2019-12-09 | 2024-09-17 | Amazon Technologies, Inc. | Efficient detection of in-memory data accesses and context information |
CN114510738B (en) * | 2021-12-31 | 2024-08-23 | 华能烟台八角热电有限公司 | Data use risk assessment method and system |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120197847A1 (en) * | 2009-10-20 | 2012-08-02 | Zte Corporation | Method and System for Monitoring and Tracing Multimedia Resource Transmission |
US8584219B1 (en) * | 2012-11-07 | 2013-11-12 | Fmr Llc | Risk adjusted, multifactor authentication |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10027711B2 (en) * | 2009-11-20 | 2018-07-17 | Alert Enterprise, Inc. | Situational intelligence |
US9703952B2 (en) * | 2014-07-07 | 2017-07-11 | University Of Ontario Institute Of Technology | Device and method for providing intent-based access control |
-
2016
- 2016-01-07 US US14/990,399 patent/US10068094B2/en active Active
-
2018
- 2018-08-06 US US16/056,050 patent/US10614225B2/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120197847A1 (en) * | 2009-10-20 | 2012-08-02 | Zte Corporation | Method and System for Monitoring and Tracing Multimedia Resource Transmission |
US8584219B1 (en) * | 2012-11-07 | 2013-11-12 | Fmr Llc | Risk adjusted, multifactor authentication |
Also Published As
Publication number | Publication date |
---|---|
US20180349616A1 (en) | 2018-12-06 |
US10068094B2 (en) | 2018-09-04 |
US20170200011A1 (en) | 2017-07-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10614225B2 (en) | System and method for tracing data access and detecting abnormality in the same | |
CN110249314B (en) | System and method for cloud-based operating system event and data access monitoring | |
US11550921B2 (en) | Threat response systems and methods | |
US20180075240A1 (en) | Method and device for detecting a suspicious process by analyzing data flow characteristics of a computing device | |
US9887886B2 (en) | Forensic software investigation | |
US10783043B2 (en) | Automation and optimization of data recovery after a ransomware attack | |
US10282702B2 (en) | Dynamic employee security risk scoring | |
US20180219875A1 (en) | Grouping alerts into bundles of alerts | |
WO2018080957A1 (en) | Method for the continuous calculation of a cyber security risk index | |
US9813450B1 (en) | Metadata-based verification of artifact quality policy compliance | |
US20120116984A1 (en) | Automated evaluation of compliance data from heterogeneous it systems | |
US20130073715A1 (en) | Methods and apparatus for remediating policy test failures, including correlating changes to remediation processes | |
US20130073893A1 (en) | Methods and apparatus for remediation workflow | |
US20130073704A1 (en) | Methods and apparatus for remediating policy test failures, including promoting changes for compliance review | |
JP2019028891A (en) | Information processing device, information processing method and information processing program | |
JP7241360B2 (en) | SECURITY POLICY AND AUDIT LOG BI-DIRECTIONAL LOOKUP, COMPARING AND TRACKING SYSTEM AND METHOD THEREOF} | |
US11651313B1 (en) | Insider threat detection using access behavior analysis | |
US9319420B1 (en) | Cyber intelligence clearinghouse | |
US10089463B1 (en) | Managing security of source code | |
KR101040765B1 (en) | System for tracing process and file using extended security level | |
US20240020391A1 (en) | Log-based vulnerabilities detection at runtime | |
US20090222876A1 (en) | Positive multi-subsystems security monitoring (pms-sm) | |
Sapegin et al. | Evaluation of in‐memory storage engine for machine learning analysis of security events | |
WO2023042192A1 (en) | A top-down cyber security system and method | |
CN114490261A (en) | Terminal security event linkage processing method, device and equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: DATIPHY INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:LIN, YEEJANG JAMES;REEL/FRAME:046565/0157 Effective date: 20160105 |
|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO SMALL (ORIGINAL EVENT CODE: SMAL); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT RECEIVED |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2551); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY Year of fee payment: 4 |